Learning rules and clusters for anomaly detection in network traffic

PK Chan, MV Mahoney, MH Arshad - Managing Cyber Threats: Issues …, 2005 - Springer
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

[PDF][PDF] LEARNING RULES AND CLUSTERS FOR ANOMALY DETECTION IN NETWORK TRAFFIC

PK Chan, MV Mahoney, MH Arshad - Citeseer
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

LEARNING RULES AND CLUSTERS FOR ANOMALY DETECTION IN NETWORK TRAFFIC

PK Chan, MV Mahoney… - Managing Cyber Threats …, 2005 - books.google.com
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

Learning Rules and Clusters for Anomaly Detection in Network Traffic

PK Chan, MV Mahoney, MH Arshad - Managing Cyber Threats - infona.pl
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

[PDF][PDF] LEARNING RULES AND CLUSTERS FOR ANOMALY DETECTION IN NETWORK TRAFFIC

PK Chan, MV Mahoney, MH Arshad - researchgate.net
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

[PDF][PDF] LEARNING RULES AND CLUSTERS FOR ANOMALY DETECTION IN NETWORK TRAFFIC

PK Chan, MV Mahoney, MH Arshad - academia.edu
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

LEARNING RULES AND CLUSTERS FOR ANOMALY DETECTION IN NETWORK TRAFFIC

PK Chan, MV Mahoney, MH Arshad - MANAGING CYBER THREATS - Springer
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

[引用][C] Learning Rules and Clusters for Anomaly Detection in Network Traffic

PK Chan, MV Mahoney, MH Arshad - Managing Cyber Threats - cir.nii.ac.jp
Learning Rules and Clusters for Anomaly Detection in Network Traffic | CiNii Research CiNii
国立情報学研究所 学術情報ナビゲータ[サイニィ] 詳細へ移動 検索フォームへ移動 論文・データを …

[PDF][PDF] LEARNING RULES AND CLUSTERS FOR ANOMALY DETECTION IN NETWORK TRAFFIC

PK Chan, MV Mahoney, MH Arshad - academia.edu
Much of the intrusion detection research focuses on signature (misuse) detection, where
models are built to recognize known attacks. However, signature detection, by its nature …

[引用][C] Learning Rules and Clusters for Anomaly Detection in Network Traffic

P Chan, M Mahoney, M Arshad - Managing Cyber Threats, 2005 - Springer